Citation Impact

Citing Papers

Modular and tunable biological feedback control using a de novo protein switch
2019 StandoutNatureNobel
Multi-objective path planning for unmanned surface vehicle with currents effects
2018 Standout
An Overview of Recent Advances in Coordinated Control of Multiple Autonomous Surface Vehicles
2020 Standout
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
2016
Integral LOS Path Following for Curved Paths Based on a Monotone Cubic Hermite Spline Parametrization
2014
The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0
2017 Standout
Toward Digitalization of Maritime Transport?
2019 Standout
AHP integrated TOPSIS and VIKOR methods with Pythagorean fuzzy sets to prioritize risks in self-driving vehicles
2020 Standout
A Formal Analysis of 5G Authentication
2018 Standout
The internet of things in healthcare: An overview
2016 Standout
Control allocation—A survey
2013 Standout
Control theory meets synthetic biology
2016
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016 Standout
Computational challenges in magnetic-confinement fusion physics
2016
Review of Security Issues in Industrial Networks
2012
How to Access Factory Floor Information Using Internet Technologies and Gateways
2011
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate
2017
Dynamic allocation for input redundant control systems
2009
Computer-inspired quantum experiments
2020 StandoutNobel
Path Generation of Autonomous Approach to a Moving Ship for Unmanned Vehicles
2015
The Evolution of Factory and Building Automation
2011
Novel Anonymous Authentication Scheme Using Smart Cards
2012
Cyber-Physical Systems Security—A Survey
2017 Standout
Risks of automation
2016

Works of A. Pironti being referenced

Novel aspects of plasma control in ITER
2015
On the Realization of an Embedded Subtractor Module for the Control of Chemical Reaction Networks
2016
Provably correct Java implementations of Spi Calculus security protocols specifications
2009
A control scheme to deal with coil current saturation in a Tokamak
2001
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS
2014
A Messy State of the Union: Taming the Composite State Machines of TLS
2015
Path Generation and Tracking in 3-D for UAVs
2009
Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access
2011
Rankless by CCL
2026